Web 2.0

Lead the way to interoperability with APIs {1}

by Toan T
This article talks about the use of APIs and how it has become the standards in what the article would call “interoperability”. The fascinating thing about  APIs is that all business and government entities all share the same common fundamental principle in the age of what we call Web 2.0. The main problem that was prominent in the age of Web 2.0 was how data gathered can be shared through out the web in a easy and simplistic way. Back then, information can only be viewed in a visualization system. This was the only way where different data can be viewed together. However, it generally takes a lot of time to develop and was very expensive. Then a new approach to the problem was mashups, it is  “a way of collating data from multiple sources using the types of API typically seen in applications such as Google Maps and eBay. Information from different databases could be automatically married and presented to analysts and Pentagon officials in the same interface.” This method allows data to be gathered through out different networks. It is what companies such as “eBay, Amazon and Flickr all make their information available in the same way, exposing their data in machine-readable forms that are easy for other applications, or in some cases web browsers, to consume.” read more...

The future of the web, HTML5 {3}

by Gerardgon Z
The world wide web is a constantly evolving and improving beast. We have gone through many versions and advances in this online world that what we will not even recognize the original version of the world wide web. It is now so intertwined with our daily lives and activities that without it we would feel isolated and disconnected from the rest of the world. HTML5 brings with it powerful  improvements and features that will only strengthens our bonds with the real and online world. The article talks about the new elements in it and how familiar yet different it is from the previous HTML. It vastly improves on the number of APIs that comes with it and its offline capabilities and application cache. HTML5 is also being developed in order to better support mobile devices to improve our experience with the web in a constantly connected world. read more...

What is the Cloud? {2}

by Nelson T
In an article that I have read from PC Magazine Online, cloud computing is the next big thing coming to consumers and businesses. Cloud computing allows people to have complete access to their personal data as well as data from other users as well. This is called Personal Cloud Computing. An example of one of the many benefits of the personal cloud is automatic sync. If a user searches for music using their mobile device, purchases a piece of music from their favorite artist, the mp3 file downloads not only on their mobile device but also downloads automatically to their home computer and other devices that are linked that cloud account. Other items include the user’s address book, email and documents.  Having access to the cloud is fairly cheap and this is attracts business. Businesses can use the cloud to do some serious data mining on the fly. Having access to information coming from their users. A way that a cloud can be distinguished is from key attributes such as it being from a third party vendor that is usually off site, accessed over the internet, minimal IT knowledge are a few attributes. Cloud computing is very useful for a connected consumer and for the success of a business. As an owner of an Apple iPhone, I am a user of their cloud service named iCloud. I find this service to be very useful. Just like my example from earlier, anything i do on my mobile smartphone is sync automatically to cloud servers and then pushed to my laptop and other devices that are connected to the iCloud service. I have personally realized the benefits of this service and its been great since the start. I rely on it almost everyday to make sure I get what i need from anywhere I am connected. read more...

Facebook to go public, finally. {Comments Off on Facebook to go public, finally.}

by Chris S
Facebook is easily the biggest social networking site on the internet. Billions of users log in everyday to stay “connected” with each other. Users from across the country can keep in contact and up to date with each other view their facebook profiles. Since the introduction of web 2.0, the internet has seen a massive increase in user generated content websites such as twitter, facebook, and tumblr. Since its release, facebook has never opened its door to the public to allow the purchase of stock in the company until now. This will cause a increase in user data mining, meaning facebook is going to come up with new ways to collect data on its users to sell to advertisers and to even share with the government. On the other end, Google announced that it will be rolling up 60 of its privacy policies into one, thus forcing facebook to bump its its competition with the search engine giant. Either way, it looks like both facebook and Google will be snooping around user web searches for the next few years to come. read more...

News Ways to Find an IT Job in a New Web World {4}

by Cary C
The article in question discusses six Web 2.0 tools that Information Technology people who are currently seeking a new job should be aware of.  “It states that just over fifty percent of all IT workers are actively looking for a new position and that about forty-six percent of these workers haven’t searched in over five years”.  Of course, the technologies used on the Internet have changed greatly in the last five years and during that time frame four tools have emerged as the dominant players in social networking and job hunting.  LinkedIn, Facebook, YouTube, and Twitter have changed the way recruiters seek people to fulfill the open positions they have.  Due to the large number of people who are currently unemployed, recruiters are being swarmed with resumes which often come from desperate, unqualified people.  As a result, these recruiters are posting jobs less and searching the social network sites for people with the skills that they are seeking.  While it is becoming easier for the recruiters to find job seekers, it is becoming increasingly more difficult for job seekers to keep their personal life separate from their professional life. read more...

JavaScript Causes Security Concerns {Comments Off on JavaScript Causes Security Concerns}

by Jonathan F

Websites have become more interactive thanks to JavaScript, but many are concerned that this scripting language can cause so security issues. Web 2.0 has allowed Websites to create a better user experience, and JavaScript takes advantage of this. Malicious JavaScript and Web site security flaws can lead to a security attack. JavaScript is a scripting programming language that was created in 1995 and is best known for its use in Web sites. Although the name has Java in it, it is not the same as Sun Microsystems’ Java .Now with Web 2.0 Web sites have become more interactive and a programming technique called AJAX has introduced more JavaScript in Web sites. David Wagner a computer science professor at the University of California Berkeley, said that JavaScript creates a major disaster because of its can be used in malicious ways. There have been a number of worms that have been created using JavaScript. A malicious script could be embedded in a Web pages and run on their own without the user even knowing. Malicious script could even be placed in Web sites through a flaw know as cross-site scripting. The best way to avoid malicious JavaScript is to disable JavaScript on your browser; the only problem with this is that a lot of Web- Sites won’t run correctly with JavaScript disabled. It is the responsibility of Web site operators to validate the JavaScript they use and try to avoid cross-site scripting. Malicious JavaScript has been around for a while but it has not been a major security until recently because of Web 2.0 and AJAX have made JavaScript a popular language to create interactive Web pages. read more...

Dr. Techo Junky {3}

by Omar N.

The article titled “Healthcare 2.0” discusses how Web 2.0 has been integrated into our healthcare system. One example is where medical videos are shared by physicians on websites like askdrwiki.com. Blogs are also used by healthcare professionals in education by sharing some real life cases. This sounds like it would be breaking some privacy act, but the article mentions that it is allowed as long as names and medical record numbers of the patients are never revealed. RSS feeds are another thing that is mentioned has increased healthcare productivity. It alerts busy doctors when a new article is published to keep them updated on research in their field. On the development side, AJAX has also been used in training and educating by reducing access times for x-rays and other images that require immediate responses. The article also uses the term “bashups” as a way to describe the combination of business intelligence and mashups in the healthcare field. For instance, insurance companies can track claims. Google maps, among other application sources, has been a useful tool in tracking the patterns in the spread of diseases. read more...

Tagging With Power {Comments Off on Tagging With Power}

by James C
Summary:

Folksonomies are used by numerous Web 2.0 services and have evolved into a vital user-driven tactic to index and retrieve information. The indexing of information is a strength of folksonomies. However, it is its retrieval methodology that is its weakness. Power tags represent a new search option that improves the type of retrieval findings. There are two kinds of tag distributions when dealing with the application of power tags. The first type of tag distribution is the power law distribution. The power law distribution has a mathematical expression whose curve simply contains a limited number of tags at the top of the distribution. It also has several tags with lower ranks on a long tail on the right side of the curve. The second type of tag distribution is known as inverse logistic distribution. Inverse logistic distribution contains many applicable tags at the start of the curve and is also called a long tail. Derived power tags are used to limit the number of searchable tags. The purpose of limiting searchable tags is to limit the number of search results and to improve accuracy. Further research will need to focus on how to take the theoretical ideology and turn it into actual solutions that assesses retrieval outcomes founded on power tags. read more...

Distributor Middleman and World Wide Web {Comments Off on Distributor Middleman and World Wide Web}

by Tuyen H

            In tradition, consumers buy manufacture products through distributors or middleman. Since the World Wide Web (Internet) and E-commerce were developed, the middlemen were preplaced by the Internet.  The Internet allows business to business (B2B) and business to customer (B2C) rapidly increasing.  E-commerce becomes an opportunity for companies to achieve their competitive advantage. Online shopping allows people easily compare products’ price and functions before making decision. This article also mentions about effective Internet marketing. With the second generation of web (Web 2.0) E-commerce becomes more attractive consumer. As the result, consumers spend more money to buy goods and services directly online instead of buying them through middlemen. The authors also point out an interesting point which there is more than 90% online purchasing is made through corporate website.
           This article talks about the Internet or World Wide Web. It also mentions to E-commerce, B2B, and B2C technologies. In my opinion, Internet is the greatest innovation of nineteenth century.  It makes the world become smaller and more connected. When the Internet is increasing, many industries also are increasing special E-commerce. Not only we have Black Friday, we now also have Cyber Monday. I am very interested in the replacement of middlemen by the WWW. Indeed, under consumers’ expect shopping online is more convenience and cheaper, and under corporations’ expect E-commerce is an opportunity to achieve their competitive advantages.
           Let get Costco Wholesale Corporation for example. Costco has created an interactive online webpage which allows customers easy access to information, price, and images of products that they offer.  They also offer many services and have descriptions about each on their webpage.  Costco also has membership and location information as well as information about the company accessible to potential and existing members. By combining online and store, Costco create a competitive advantage over its competition. read more...

Web 2.0 may be riskier than ever {3}

by Boshi W

With the emerge of web 2.0 seem promising and full of excitement, it is however, not without risks involve. This article points out the risk factors involve in this new technology and how it might be too risky to adapt. It talks about how web 2.0’s interactive nature creats new avenues for information leakage, making it difficult to secure. Hackers can now more easily attack web 2.0 sites with tactics such as using cross site scripting (XSS) since web 2.0 also utilizes newer technologies such as RSS, Ajax, and even instant messaging. read more...